Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https://www.vpnmentor.com/blog/critical-vulnerability-gpon-router/), kudos for their work.
Switch branches/tags
Nothing to show
Clone or download
Latest commit f99b854 May 10, 2018
Permalink
Failed to load latest commit information.
README.md Update README.md May 10, 2018
gpon_rce.py Rename gpon_rce.py.py to gpon_rce.py May 8, 2018

README.md

RCE on GPON home routers (CVE-2018-10561)

Press

The Hacker News - 1

The Hacker News - 2

KitPloit

Security Affairs

Vulnerability

Many routers today use GPON internet, and a way to bypass all authentication on the devices (CVE-2018-10561) was found by VPNMentor. With this authentication bypass, it's also possible to unveil another command injection vulnerability (CVE-2018-10562) and execute commands on the device.

At the time it was written almost ONE MILLION of these devices are exposed to the Internet, according to Shodan.

Dependencies required

requests

urllib2

Tested on

Kali Linux

Ubuntu 17.10 Server

Usage

python gpon_rce.py TARGET_URL COMMAND

e.g.

python gpon_rce.py http://192.168.1.15 'id'

Screenshots